General

  • Target

    2024-06-04_8eeab4e687b1055d36563ac1e8f43e63_cryptolocker

  • Size

    80KB

  • MD5

    8eeab4e687b1055d36563ac1e8f43e63

  • SHA1

    44ced0bff36382f037453f4256918df674ed5182

  • SHA256

    818652aa95d536418f6ad6ec5136958e1a0cc13b69731c5c69d6641ae522f515

  • SHA512

    7f4824b7eef9f42fd52a293b98abffdd02f2086271f1c7b5718f9f5cb1d9437cfb780a5eb1b0ee25f42f086f8fdcfc472e59e67af1fd8bd4be1adc1a2fc544d1

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOAkXtBdxPUxB1+:T6a+rdOOtEvwDpjNtHPp

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-06-04_8eeab4e687b1055d36563ac1e8f43e63_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections